


default search action
22nd AINA Workshops 2008: Gino-wan City, Okinawa, Japan
- 22nd International Conference on Advanced Information Networking and Applications, AINA 2008, Workshops Proceedings, GinoWan, Okinawa, Japan, March 25-28, 2008. IEEE Computer Society 2008

- M. V. Panduranga Rao, K. Chandrashekar Shet, R. Balakrishna, K. Roopa:

Development of Scheduler for Real Time and Embedded System Domain. 1-6 - Cai Zhiming, Yin Jun, Huang Liangli:

The Solution Modelling System with Grouped Agents. 7-11 - Min Peng, Laurence Tianruo Yang, Wuqing Zhao, Naixue Xiong:

Wireless Service Attributes Classification and Matching Mechanism Based on Decision Tree. 12-17 - Xuan Gu, Dong Wang, Huanye Sheng:

RFID-Based Locating Management. 18-23 - Li Han, Jyri P. Salomaa, Jian Ma, Kuifei Yu:

Research on Context-Aware Mobile Computing. 24-30 - Hiroyasu Mitsui, Hidetoshi Kambe, Satoshi Endo, Hisao Koizumi:

A Student Experiment Method for Learning the Basics of Embedded Software Development Including HW/SW Co-design. 31-37 - Hiroaki Yuze, Chaoqun Wang, Shigeki Sugiura, Takeshi Otofuji, Toshiki Aikawa:

A Prototype System to Support the KJ Method by Cooperation between Visually-Impaired Persons and Sighted Persons. 38-43 - Andreas Konstantinidis, Thrasyvoulos Tsiatsos:

Selecting a Networked Virtual Environment Platform and the Design of a Collaborative e-Learning Environment. 44-49 - Ming-Yang Su, Sheng-Cheng Yeh, Kai-Chi Chang, Hua-Fu Wei:

Using Incremental Mining to Generate Fuzzy Rules for Real-Time Network Intrusion Detection Systems. 50-55 - Jianhua Yang, Byong Lee, Stephen S. H. Huang:

Monitoring Network Traffic to Detect Stepping-Stone Intrusion. 56-61 - Nen-Fu Huang, Hsien-Wei Hung, Sheng-Hung Lai, Yen-Ming Chu, Wen-Yen Tsai:

A GPU-Based Multiple-Pattern Matching Algorithm for Network Intrusion Detection Systems. 62-67 - Jin-Cherng Lin, Chun-Lun Chou, Cheng-Hsiung Liu:

Performance Evaluation for Scheduling Algorithms in WiMAX Network. 68-74 - Sina Meraji, Hamid Sarbazi-Azad:

Empirical Performance Evaluation of Stretched Hypercubes. 75-79 - Priscila Solís Barreto, Paulo Henrique Portela de Carvalho:

Hybrid Traffic Model for Multimedia Network Performance Evaluation. 80-85 - Po-Cheng Chen, Cheng-I Lin, Sheng-Wei Huang, Jyh-Biau Chang, Ce-Kuen Shieh, Tyng-Yeu Liang:

A Performance Study of Virtual Machine Migration vs. Thread Migration for Grid Systems. 86-91 - Cameron Kiddle, Derek Kivi, Rob Simmonds:

Model-Driven Automation in Grid Environments. 92-99 - Xudong Ni, Junzhou Luo:

A Clustering Analysis Based Trust Model in Grid Environment Supporting Virtual Organizations. 100-105 - YongNyuo Shin, YongJun Lee, Woochang Shin, Jinyoung Choi

:
Designing Fingerprint-Recognition-Based Access Control for Electronic Medical Records Systems. 106-110 - Giovanni Russello, Changyu Dong, Naranker Dulay:

A Workflow-Based Access Control Framework for e-Health Applications. 111-120 - Sekpon Juntapremjitt, Somchart Fugkeaw

, Piyawit Manpanpanich:
An SSO-Capable Distributed RBAC Model with High Availability across Administrative Domain. 121-126 - Yinliang Yue, Fang Wang, Dan Feng:

DS-MOSD: A Dynamic Selectable Master OSD Model for Large-Scale Object-Based Storage System. 127-132 - Yusuke Murase, Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa

:
Distributed Databases in Dynamic R-Tree for Vehicle Information Systems. 133-138 - Lubna K. Alazzawi, Ali M. Elkateeb, Aiyappa Ramesh, Waleed Aljuhar:

Scalability Analysis for Wireless Sensor Networks Routing Protocols. 139-144 - Jaiwant Mulik:

Maxflow Based Routing for Traffic Engineering and Sustained High Bitrate Applications. 145-150 - Xiangjiang Hu, Peidong Zhu, Kaiyu Cai, Zhenghu Gong:

AS Alliance in Inter-Domain Routing. 151-156 - Yong-Ju Lee, Hag-Young Kim, Cheol-Hoon Lee:

A Stochastic Availability Prediction Model for Head Nodes in the HA Cluster. 157-161 - Suzhen Wu, Dan Feng, Bo Mao, Jianxi Chen, Lingfang Zeng

:
SOSRAID-6: A Self-Organized Strategy of RAID-6 in the Degraded Mode. 162-167 - Katsuyoshi Matsumoto, Shingo Nomoto, Minoru Uehara, Hideki Mori:

Fault Tolerant Small-World Cellular Neural Networks. 168-172 - Kenichi Tanaka, Minoru Uehara, Hideki Mori:

Parallel Computing of CG Using an Open Source Windows Grid. 173-180 - Yih-Jiun Lee, Kai-Wen Lien:

Script: Simulations from Grid to Ubiquitous Computing. 181-186 - Ke Xu, Junwei Cao, Lianchen Liu, Cheng Wu:

Performance Optimization of Temporal Reasoning for Grid Workflows Using Relaxed Region Analysis. 187-194 - Kenichi Tanaka, Minoru Uehara, Hideki Mori:

A Case Study of a Linux Grid on Windows Using Virtual Machines. 195-200 - Yongyi Zhao, Jin Li:

Research on Location Service Integration Strategy. 201-204 - Misbah Mubarak, Sara Sultana, Zarrar Abbas Khan, Hafiz Farooq Ahmad

, Hajra Batool Asghar
, Hiroki Suguri:
Strongly Instrumented Generic Mobility Architecture (SIGMA). 205-210 - Andre Elia Assad, Nelson Souto Rosa

:
Device Middleware for Heterogeneous Access to Java Services. 211-216 - Eunyong Park, Sunyoung Han, Heemin Kim, Kiwon Son:

Cross-Correlated FEC Scheme for Multimedia Streaming over Wireless LAN. 217-222 - Razvan Beuran, Junya Nakata, Takashi Okada, Lan Tien Nguyen, Yasuo Tan, Yoichi Shinoda:

A Multi-Purpose Wireless Network Emulator: QOMET. 223-228 - Ngoc Bao Tran, Dinh Thuc Nguyen:

A Graph Isomorphism Based Authentication Protocol for Access Control in WLAN. 229-234 - Shingo Kawamura, Shinya Toji, Minoru Uehara, Hideki Mori:

A Method of Project Member Arrangement of Using SOM for a Web Community. 235-240 - Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai:

Thoughts on Multi-Disciplinary Inspired Research on Open Network and Information System. 241-246 - Junze Wang, Yi Guo, Benxiong Huang, Jianhua Ma, Yijun Mo:

Delta Compression for Information Push Services. 247-252 - Boyoung Rhee, Kwangman Koh, Sunyoung Han:

Overlay Multicast Architecture Supporting QoS over NGN. 253-258 - Mohamed El Hachimi, Marc-Andre Breton, Maria Bennani:

Efficient QoS Implementation for MPLS VPN. 259-263 - Dan Feng, Chengtao Lu, Fang Wang:

eMuse: QoS Guarantees for Shared Storage Servers. 264-269 - Kuo-Qin Yan, Shun-Sheng Wang, Shu-Ching Wang:

An Optimal Solution of Byzantine Agreement in a Scale Free Network. 270-275 - Rashid Bin Muhammad

:
A Parallel Computation of the Steiner Tree Algorithm on Server-Client Paradigm. 276-280 - Kai Han, Binoy Ravindran

, E. Douglas Jensen:
LRTG: Scheduling Distributed Real-Time Tasks in Unreliable and Untrustworthy Systems. 281-287 - Zheng Da Wu:

Resource-Cost Analysis for Massively Multiplayer Online Games. 288-295 - Dan Gao, Jueping Cai, Zan Li, Xing Wei, Rei Chen:

Credit Token Based Dynamic Resource Renting and Offering Mechanism for Cognitive Radio WRAN BS Spectrum Sharing. 296-300 - Mohsen Taherian, Rasool Jalili, Morteza Amini

:
PTO: A Trust Ontology for Pervasive Environments. 301-306 - Mingchu Li, Yizhi Ren, Kouichi Sakurai, Yongrui Cui, Zhi-Hui Wang:

Granularity Considering in a Trust Model for P2P Networks. 307-312 - Yoshio Nakajima, Alireza Goudarzi Nemati, Tomoya Enokido, Makoto Takizawa

:
Trustworthiness and Confidence of Peers in Peer-to-Peer (P2P) Network. 313-318 - Alireza Goudarzi Nemati, Makoto Takizawa

:
Application Level QoS in Multimedia Peer-to-Peer (P2P) Networks. 319-324 - Xuping Tu, Hai Jin, Xiaofei Liao, Weidong Wang, Sirui Yang, Qi Huang:

Collaboratively Scheduling to Decrease Inter-AS Traffic in P2P Live Streaming. 325-330 - Kai Hu, Yan Jiang, Zhibin Yang, Shiran Chen:

An Expanded Stochastic Model in DAG Schemes. 331-336 - Jing Du, Canqun Yang, Fujiang Ao, Xuejun Yang:

OSS: Efficient Compiler Approach for Selecting Optimal Strip Size on the Imagine Stream Processor. 337-342 - Yuehua Shi, Feng Zhao, Zhong Zhang:

Hardware Implementation of ADABOOST ALGORITHM and Verification. 343-346 - Mehrdad Manaffar, Hamidreza Bakhshi, Mostafa Pilevari:

A New Dynamic Pricing Scheme with Call Admission Control to Reduce Network Congestion. 347-352 - Mohammad Mirza-Aghatabar, Somayyeh Koohi, Shaahin Hessabi

, Dara Rahmati
:
An Adaptive Approach to Manage the Number of Virtual Channels. 353-358 - Muhammad Bilal Ali, Muhammad Kamran, Hafiz Farooq Ahmad

, Hiroki Suguri, Ali Liaqat:
Cell Level Co-Operation for SLA Based Radio Resource Management. 359-364 - Ying Huang, Xiangsheng Fu, Qiang Hou, Zifan Yu:

The Early Detection of DDoS Based on the Persistent Increment Feature of the Traffic Volume. 365-370 - Tae-Hyung Kim, Young-Sik Choi, Jong Kim, Sung Je Hong:

Annulling SYN Flooding Attacks with Whitelist. 371-376 - Yacine Djemaiel, Noureddine Boudriga:

Dynamic Detection and Tolerance of Attacks in Storage Area Networks. 377-382 - Benting Wan

:
Scheduling Strategy of Subtask Decomposed. 383-386 - Gonzalo Huerta Cánepa, Dongman Lee:

An Adaptable Application Offloading Scheme Based on Application Behavior. 387-392 - Pedro Nuno San-Bento Furtado

:
Efficient Shared Computations over Distributed Sites. 393-398 - Yoshitaka Yokokawa, Koji Hashimoto, Yoshitaka Shibata:

PLEXCast: Peer-to-Peer Flexble Broadcast System. 399-406 - Keita Matsuo, Leonard Barolli, Fatos Xhafa

, Akio Koyama, Arjan Durresi, Makoto Takizawa
:
Design and Implementation of a JXTA-Overlay P2P System and Smart Box Environment. 407-412 - Ying Wang, Xinjun Du, Hui Li, Yumin Wang:

The Design of Optimal Period Interleaver. 413-415 - Ren-Chiun Wang, Wen-Shenq Juang, Chin-Laung Lei:

An Anonymous and Deniable Conversation for a Thin Client. 416-421 - Jingwei Liu

, Rong Sun, Wenping Ma, Ying Li, Xinmei Wang:
Fair Exchange Signature Schemes. 422-427 - Guoyan Zhang, Shaohui Wang:

Aggregate and Separate of Signatures in Wireless Network. 428-433 - Joel J. P. C. Rodrigues, Mário M. Freire

:
Performance Assessment of Enhanced Just-in-Time Protocol in OBS Networks Taking into Account Control Packet Processing and Optical Switch Configuration Times. 434-439 - Shu-Ming Tseng

, Yu-Chin Kuo, Yueh-Teng Hsu:
Simpler and More Accurate Throughput Analysis of CDMA Pure ALOHA Networks with Variable Length Traffic. 440-444 - Cheng-Feng Tai, Lin-Huang Chang, Ting-Wei Hou:

Improvement of SCTP Performance during Handshake Process. 445-450 - Wu-Hong Tsai, Yuan-Sun Chu:

A Core Migration Method to Minimize Inter-Destination Delay Variation. 451-456 - R. Gunasundari

, S. Shanmugavel, K. Bakyalakshmi:
Fault Tolerant HAWAII Protocol for IP services in Wireless Networks. 457-462 - Dai Bin, Furong Wang, Jianhua Ma, Liu Jian:

Enhanced Chord-Based Routing Protocol Using Neighbors' Neighbors Links. 463-466 - Ivan Tomek, Rick Giles, Hai Zhang, Li Di:

FVE - A Virtual Environment for Collaboration. 467-472 - Cin-Shung Yang, Pang-Chieh Wang, Cheng-Liang Lin, Ting-Wei Hou:

Personalized iDTV Program in Multimedia Home Platform. 473-476 - Akihiro Miyakawa, Tomoyuki Ishida, Yoshitaka Shibata:

Visual and Physical Feature Analysis for Kansei Retrieval Method in VR Japanese Crafting Presentation System. 477-482 - Atsushi Takeda, Kazuo Hashimoto, Gen Kitagata, Salahuddin Muhammad Salim Zabir, Tetsuo Kinoshita

, Norio Shiratori:
A New Authentication Method with Distributed Hash Table for P2P Network. 483-488 - Jedsada Phengsuwan, Naiyana Sahavechaphan:

WindChimer: The Partially Centralized and Controlled P2P System for Better Discovery. 489-494 - Masakazu Maruoka, Alireza Goudarzi Nemati, Valbona Barolli, Tomoya Enokido, Makoto Takizawa

:
Role-Based Access Control in Peer-to-Peer (P2P) Societies. 495-500 - Eiji Sugino, Katsuyoshi Onodera, Norihisa Segawa, Jun Sawamoto:

Construction of Distributed Terminal Management System in Consideration of Hierarchical Subnet in Intranet. 501-507 - Hoyoung Lee, Jing Liu, Sunyoung Han:

Practical Multicast Security Architecture Using Sleep State. 508-513 - Mohammad Mirza-Aghatabar, Arash Tavakkol, Hamid Sarbazi-Azad, Abbas Nayebi:

An Adaptive Software-Based Deadlock Recovery Technique. 514-519 - Yan Shi, Min Sheng:

Study of a Scheduling Algorithm Based on Simple Network Coding with High Throughput and Low Delay. 520-525 - Lechang Cheng, Norman C. Hutchinson, Mabo Robert Ito:

RealNet: A Topology Generator Based on Real Internet Topology. 526-532 - Masaaki Noro, Fumiaki Tameshige, Ken-ichi Baba, Shinji Shimojo

:
Performance Evaluation of Advanced High-Speed Data Transfer Methods in Long-Distance Broadband Networks. 533-540 - Fan Zhang, Furong Wang, Bin Dai, Yafang Li:

Performance Evaluation of IEEE 802.15.4 Beacon-Enabled Association Process. 541-546 - Vasaka Visoottiviseth, Niwat Bureenok:

Performance Comparison of ISATAP Implementations on FreeBSD, RedHat, and Windows 2003. 547-552 - Koji Hashimoto, Yoshitaka Shibata:

Design and Implementation of Adaptive Streaming Modules for Multipoint Video Communication. 553-560 - Tarek R. Sheltami

:
Neighbor-Aware Clusterhead for SNET. 561-566 - Bunthit Watanapa, Saowaluk Watanapa:

A Fuzzy Approach for Personalized Product Clustering with Flexible Discriminating Power. 567-572 - Wei-Hua Jiang, Jun Du, Feng Liu:

Research on System Integrative Evaluation Method Based on Survivability. 573-577 - Xin Xiao, Yuanchun Shi, Zhijia Chen, Baopeng Zhang

:
On Constructing High Performance Overlay for Layered Streaming in Heterogeneous Networks. 578-584 - Jiandong Li, Xiaoyan Sun, Pengyu Huang, Jiyong Pang:

Performance Analysis of Active Target Localization Using TDOA and FDOA Measurements in WSN. 585-589 - Chun-Hsin Wang, Yen-Chih Chiang:

Multi-Layer Traceback under the Hierarchical Tracers Deployment. 590-595 - Ming Dong Wan, Han-Ching Wu, Ying-Wei Kuo, James Marshall, Shou-Hsuan Stephen Huang:

Detecting Masqueraders Using High Frequency Commands as Signatures. 596-601 - Jin-Cherng Lin, Jan-Min Chen, Cheng-Hsiung Liu:

An Automatic Mechanism for Adjusting Validation Function. 602-607 - Yong Liu, Zhong Chen, Yu Chen:

How to Optimize the Cryptographic Symmetric Primitives on Loongson-2E Microprocessor. 608-614 - Jongwoo Sung, Sungjin Ahn

, Taesoo Park, Seonghun Jang, Dongheui Yun, Jonggu Kang
, Seongeun Yoo
, Pohkit Chong
, Daeyoung Kim:
Wireless Sensor Networks for Cultural Property Protection. 615-620 - Emad A. El-Sebakhy:

New Computational Intelligence Paradigm for Estimating the Software Project Effort. 621-627 - Seongeun Yoo

, Pohkit Chong, Taisoo Park, Youngsoo Kim, Daeyoung Kim, Changsub Shin, Kyungbok Sung, Hyunhak Kim:
DGS: Driving Guidance System Based on Wireless Sensor Network. 628-633 - Amirhosein Taherkordi, Reza Mohammadi, Frank Eliassen:

A Communication-Efficient Distributed Clustering Algorithm for Sensor Networks. 634-638 - Yi Wang, Furong Wang, Chunming Rong

, Sufang Wang:
SPM: A Security Policy Based on Micropayment in Ad Hoc Networks. 639-643 - Jin-Hee Cho, Ing-Ray Chen, Phu-Gui Feng:

Performance Analysis of Dynamic Group Communication Systems with Intrusion Detection Integrated with Batch Rekeying in Mobile Ad Hoc Networks. 644-649 - Yu-Fang Chung

, Tzer-Shyong Chen
, Chia-Hui Liu, Tzu-Chi Wang:
Efficient Hierarchical Key Management Scheme for Access Control in the Mobile Agent. 650-655 - Himanshu Pagey:

Building User Confidence in RFID Technology for Mobile and Retail Environments. 656-661 - Taehong Kim

, Young-Guk Ha, Jihoon Kang, Daeyoung Kim, Pohkit Chong
, Joo-Chan Sohn:
Experiments on Building Ubiquitous Robotic Space for Mobile Robot Using Wireless Sensor Networks. 662-667 - Paul Werstein:

An Experimental Network Proxy for Power Managed End Nodes. 668-674 - Ali El Kateeb, Lubna Al Azzawi:

Hardware Reconfiguration Capability for Third Generation Sensor Nodes: Design and Challenges. 675-680 - Pedro N. E. S. Barbosa, Neil M. White, Nick R. Harris:

Wireless Sensor Network for Localized Maritime Monitoring. 681-686 - Soohong Park, Minho Lee, Cheolju Hwang:

Location Information Look-Up for Intelligent Handover Decision. 687-691 - Benting Wan

:
Business-Based SMS Mobile Search. 692-695 - Rogério Luís de Carvalho Costa

, Pedro Furtado
:
Scheduling in Grid Databases. 696-701 - Haiyang Hu, Hua Hu:

Energy Optimization for Data Flow in Mobile Ad Hoc Wireless Networks Using Cooperative Communication. 702-707 - Snehasis Mukhopadhyay, Niranjan Jayadevaprakash:

Automated Metadata Generation and its Application to Biological Association Extraction. 708-713 - Hiram Firpi, Eunseog Youn, Sean Mooney

:
Comparative Study of Particle Swarm Approaches for the Prediction of Functionally Important Residues in Protein Structures. 714-719 - Ping-Tsai Chung, Hsin-Hua Hsiao:

Probabilistic Relational Database Applications for Biomedical Informatics. 720-725 - Che-Lun Hung, Chun-Yuan Lin, Yeh-Ching Chung, Chuan Yi Tang:

Introducing Variable Gap Penalties into Three-Sequence Alignment for Protein Sequences. 726-731 - Dong Seong Kim

, Sazia Parvin
, Jong Sou Park:
Software Rejuvenation and Reconfiguration for Enhancing Survivability of Sensor Networks. 732-737 - Soonmok Kwon, Jeonggyu Kim, Cheeha Kim:

An Efficient Tree Structure for Delay Sensitive Data Gathering in Wireless Sensor Networks. 738-743 - Ben-Jye Chang, Yan-Min Lin, Ying-Hsin Liang:

Distributed Wireless Links Repair for Maximizing Reliability and Utilization in Multicast MANET. 744-749 - Kai Wang, Yan Sui, Xukai Zou, Arjan Durresi, Shiaofen Fang:

Pervasive and Trustworthy Healthcare. 750-755 - Mahmood Hasanlou, Ebrahim Fazli, Ali Movaghar

, Hossein Mohammadi:
3MOKAN: A Novel Mobility Management Mechanism Based on Keeping Alternative Nodes. 756-761 - Jing Zuo, Xuefen Chi, Lin Guan

, Hongxia Li:
Service-Aware Multi-Constrained Routing Protocol with QoS Guarantee Based on Fuzzy Logic. 762-767 - Jen-Yi Pan

, Jing-Luen Lin, Kai-Fung Pan:
Multiple Care-of Addresses Registration and Capacity-Aware Preference on Multi-Rate Wireless Links. 768-773 - Jacques Demongeot

:
Biological Boundaries and Biological Age: Solutions of Variational Problems. 774-781 - Jacques Demongeot

, Michel Morvan, Sylvain Sené:
Impact of Fixed Boundary Conditions on the Basins of Attraction in the Flower's Morphogenesis of Arabidopsis Thaliana. 782-789 - Emmanuel Montseny, Andrei Doncescu:

Reduction of Complexity via Operatorial Parametric Formulations for Some Nonlinear Dynamic Problems of Biology. 790-795 - Tobias Sayre, Rahul Singh:

Protein Structure Comparison and Alignment Using Residue Contexts. 796-801 - Suk Hoon Jung, Desok Kim, Dong-Soo Han

:
Conserved Domain Combination Identification in Human Proteins. 802-807 - Yoshitaka Yamamoto, Katsumi Inoue

, Andrei Doncescu:
Estimation of Possible Reaction States in Metabolic Pathways Using Inductive Logic Programming. 808-813 - Connie Phong, Raul Singh:

Missing Value Estimation for Time Series Microarray Data Using Linear Dynamical Systems Modeling. 814-819 - Hong-Soog Kim, Woo-Hyuk Jang, Dong-Soo Han

:
Communication Protocols and Message Formats for BLAST Parallelization on Cluster Systems. 820-825 - Hassan Sharabaty

, Bruno Jammes, Daniel Esteve:
EEG Analysis Using HHT: One Step Toward Automatic Drowsiness Scoring. 826-831 - Dominique Dudkowski, Harald Weinschrott, Pedro José Marrón

:
Design and Implementation of a Reference Model for Context Management in Mobile Ad-Hoc Networks. 832-837 - Somkiat Sae-Ueng, Sineenard Pinyapong, Akihiro Ogino

, Toshikazu Kato:
Personalized Shopping Assistance Service at Ubiquitous Shop Space. 838-843 - Sébastien Duval, Christian Hoareau, Hiromichi Hashizume:

Design of a Ubiquitous System for Affective Bonding and Support within the Family. 844-849 - Sébastien Duval, Christian Hoareau, Hiromichi Hashizume:

Fundamental Needs in Intelligent Environments: Specificities for Older Adults. 850-855 - Akimitsu Kanzaki, Tetsuya Taniguchi, Takahiro Hara, Shojiro Nishio:

A Data Propagation Using Mobile Terminal in Locally Distributed Ad-Hoc Networks. 856-861 - Shahram Ghandeharizadeh, Shahin Shayandeh, Tooraj Helmi:

To Share or Not to Share Storage in Mesh Networks: A System Throughput Perspective. 862-867 - Lars Frank:

A Transaction Model for Mobile Atomic Transactions. 868-873 - Masako Shinohara, Takahiro Hara, Shojiro Nishio:

On Effective Data Transmission in Mobile Ad Hoc Networks. 874-879 - I-Shyan Hwang, Bor-Jiunn Hwang, K. Robert Lai

, Ling-Feng Ku, Chien-Chieh Hwang:
Adaptive QoS-Aware Resource Management in Heterogeneous Wireless Networks. 880-885 - Rita de Cássia Acioli Lima, Nelson Souto Rosa

, Igor Roberto L. Marques:
TS-Mid: Middleware for Wireless Sensor Networks Based on Tuple Space. 886-891 - Ali El Kateeb, Aiyappa Ramesh, Lubna Al Azzawi:

Wireless Sensor Nodes Processor Architecture and Design. 892-897 - Katsumi Onodera, Toshiaki Miyazaki:

An Autonomous Algorithm for Construction of Energy-conscious Communication Tree in Wireless Sensor Networks. 898-903 - Abbas Nayebi, Hamid Sarbazi-Azad, Kasra Alishahi:

Analysis of k-Neigh Topology Control Protocol for Wireless Networks. 904-909 - Ismat K. Maarouf, Tarek R. Sheltami

:
Simulation-Based Analysis for GEAR Performance Optimization. 910-915 - Chiu-Kuo Liang, Yu-Jie Huang, Jian-Da Lin:

An Energy Efficient Routing Scheme in Wireless Sensor Networks. 916-921 - Cheng-Zen Yang

, Chun-Ta Lin, I-Hsuan Huang:
TPSF+C: A Two-Phase On-Demand Scatternet Formation Algorithm Considering Route Stability. 922-927 - Jung-Hwan Kim, Sajjad Hussain Chauhdary

, WenCheng Yang, Dong-Sub Kim, Myong-Soon Park:
PRODUCE: A Probability-Driven Unequal Clustering Mechanism for Wireless Sensor Networks. 928-933 - Ryouhei Kawano, Toshiaki Miyazaki:

Distributed Data Aggregation in Multi-sink Sensor Networks Using a Graph Coloring Algorithm. 934-940 - Seung-Joon Choi, Ki-Hyuk Kwon, Sang-Jo Yoo:

An Efficient Cross-Layer Based Flooding Algorithm with Retransmission Node Selection for Wireless Sensor Networks. 941-948 - Lei Chen, Chung-wei Lee:

The Effects of Mobility and Redundancy on Wireless Video Streaming over MANETs. 949-953 - Huafeng Wu, Chaojian Shi, Xi Zhou, Haiguang Chen, Chuanshan Gao:

eSeagull: Design of Mobile P2P File Sharing System at Sea. 954-959 - Eiji Takimoto

, Yoshihisa Kondo, Satoko Itaya, Ryutaro Suzuki, Sadao Obana:
Evaluation of Multi-Channel Flooding for Inter-Vehicle Communication. 960-965 - Kuo-Hui Yeh, Nai-Wei Lo, Enrico Winata:

An Efficient Tree-Based Tag Identification Protocol for RFID Systems. 966-970 - Khurram Shahzad

, Arshad Ali
, Nasir D. Gohar:
ETSP: An Energy-Efficient Time Synchronization Protocol for Wireless Sensor Networks. 971-976 - Daishi Inoue, Tetsuya Shigeyasu, Hiroshi Matsuno, Norihiko Morinaga:

A New MAC Protocol for Avoiding Needless Transmission Deferment Induced by Missed RTS/CTS Handshake. 977-982 - Stéphane Maag, Cyril Grepet:

A Node Self Similarity Approach for Interoperability Testing of Ad Hoc Routing Protocols. 983-988 - I-Shyan Hwang, Bor-Jiunn Hwang, Ruey-Rong Su, K. Robert Lai

, Chyi-Jy Lin:
An Integrated ISV Call Management Strategy in Heterogeneous Wireless Networks. 989-994 - Xiaoyan Sun, Jiandong Li, Pengyu Huang, Jiyong Pang:

Total Least-Squares Solution of Active Target Localization Using TDOA and FDOA Measurements in WSN. 995-999 - Yusuke Gotoh, Yasuo Ebara, Tomoki Yoshihisa, Koji Koyamada, Masanori Kanazawa:

Development of Tea Ceremony e-Learning Environment within Immersive Projection Technology. 1000-1005 - Satoshi Oonuki, Tetsuro Ogi:

VR BBS Using Immersive Virtual Environment. 1006-1011 - Go Chiba, Tomoyuki Ishida, Yoshitaka Shibata:

High-Resolution Presentation Environment Using Multi Displays. 1012-1016 - Yasuo Ebara, Nobuyuki Kukimoto, Koji Koyamada:

Evaluation Experiment on Eye-to-Eye Contact in Remote Communication with Tiled Displays Environments. 1017-1022 - Tomoyuki Ishida, Akihiro Miyakawa, Yoshitaka Shibata:

Proposal of Multimodal Communications System Using Tele-Immersion Technology. 1023-1028 - Hironori Kaida, Masahiro Okuda:

Image Compression Suitable for High Dynamic Range Image Rendering. 1029-1033 - Shunji Uchino, Norihiro Abe, Hiroshi Takada, Tetsuya Yagi, Hirokazu Taki, Shoujie He:

Virtual Reality Interaction System between User and Avatar with Distributed Processing. 1034-1039 - Hiroki Ogasawara, Yoshitaka Shibata:

Asynchronous Collaborative Virtual Environment Support System by Using Revision Tree Presentation Method. 1040-1045 - Shih Ta Kuan, Bang Ye Wu, Wan-Jui Lee:

Finding Friend Groups in Blogosphere. 1046-1050 - Nikolay N. Mirenkov, Kamen Kanev, Hiroshi Takezawa:

Quality of Life Supporters Employing Music Therapy. 1051-1056 - Tsutomu Okawa, Tsukasa Kaminishi, Syuichi Hirabayashi, Hisao Koizumi, Jun Sawamoto:

An Information System Development Method Based on the Link of Business Process Modeling with Executable UML Modeling and its Evaluation by Prototyping. 1057-1064 - Han-Bin Chang, Timothy K. Shih, Hui-Huang Hsu, Chun-Chia Wang:

An Interactive Video Course Platform with Authoring and Playback Systems. 1065-1070 - Nobuo Funabiki, Aki Mouri, Walaa Hassan

, Toru Nakanishi:
A Lecture Scene Playback System Using Digital Picture-Card Show for Distance Learning. 1071-1076 - Yuka Kato

:
A Rate Control Method for Subjective Video Quality on Mobile Data Terminals. 1077-1082 - Koichi Gyoda, Hoang Nam Nguyen, Kazunori Okada, Osamu Takizawa:

Analysis of Ad Hoc Network Performance in Emergency Communication Models. 1083-1088 - Kanae Sakamoto, Misako Urakami, Tetsuya Shigeyasu, Hiroshi Matsuno:

Disaster Information Service System for Relief Activities Using Ad-Hoc Network A Network Construction Algorithm and Results of Field Experiments. 1089-1094 - Takahiro Fujiwara, Takashi Watanabe

:
A Scheme for Damage Information Gathering Based on Micro Perspective in Sensor Networks. 1095-1100 - Hiroyuki Echigo, Yoshitaka Shibata:

Performance Evaluation of Large Scale Disaster Information System over Japan Gigabit Network. 1101-1106 - Hiroaki Yuze, Zhengyi Zhang, Yuki Yoshida, Takashi Kawada, Chaoqun Wang:

Development of the Universal Safety Information Registration System for Vulnerable People Using a Mobile Phone. 1107-1112 - Nobuhiro Sawano, Tsuyoshi Hoshikawa, Takayuki Obata:

Web-Based Support Coordination by Using WIDIS - Case Study of Chuesu-oki Earthquake in 2007. 1113-1117 - Yoshitaka Shibata, Yosuke Sato, Naoki Ogasawara, Go Chiba:

Ballooned Wireless Mesh Network for Emergency Information System. 1118-1122 - Osamu Takizawa, Masafumi Hosokawa, Ken'ichi Takanashi, Yasushi Hada, Akihiro Shibayama

, Byeong-pyo Jeong:
Pinpointing the Place of Origin of a Cellular Phone Emergency Call Using Active RFID Tags. 1123-1128 - Kazuo Takahata, Shinya Takada, Yoshitaka Shibata:

Disaster Communication Network by Combination of Different Wireless LANs. 1129-1133 - Nobuhiro Sawano:

Current Situation of Digitalized Ship Navigation System for Safety. 1134-1137 - Kulwadee Somboonviwat

, Shinji Suzuki, Masaru Kitsuregawa:
Structure of the Thai Web Graph. 1138-1143 - Verayuth Lertnattee, Thanaruk Theeramunkong:

Improving Thai Academic Web Page Classification Using Inverse Class Frequency and Web Link Information. 1144-1149 - Kotaro Nakayama, Masahiro Ito, Takahiro Hara, Shojiro Nishio:

Wikipedia Mining for Huge Scale Japanese Association Thesaurus Construction. 1150-1155 - Akio Kitahara, Taichi Joutou, Keiji Yanai

:
Associating Faces and Names in Japanese Photo News Articles on the Web. 1156-1161 - Masashi Toyoda:

Mining and Visualizing the Evolution of the Web Graph Structure. 1162 - Zhiling Hong, Qingshan Jiang:

Hybrid Content-Based Trademark Retrieval Using Region and Contour Features. 1163-1168 - Atsushi Fujii, Seiji Takegata:

A Question Answering System for the Operation of Software Applications. 1169-1174 - Chien-Chih Chen, Kai-Hsiang Yang, Hung-Yu Kao, Jan-Ming Ho:

BibPro: A Citation Parser Based on Sequence Alignment Techniques. 1175-1180 - Min-Feng Wang, Jui-Hwa Feng, Meng-Feng Tsai:

A Data Warehousing Approach to Discover Knowledge in Peer-to-Peer Application. 1181-1186 - Takahiro Hayashi, Koji Abe, Rikio Onai:

Retrieval of Personal Web Documents by Extracting Subjective Expressions. 1187-1192 - Kai Cheng, Xiaodong You, Yanchun Zhang:

Efficient Management of Semi-Persistent Data for the Evolving Web. 1193-1198 - Yasuaki Yoshida, Takanori Ueda

, Takashi Tashiro, Yu Hirate, Hayato Yamana
:
What's Going on in Search Engine Rankings? 1199-1204 - Minghua Pei, Kotaro Nakayama, Takahiro Hara, Shojiro Nishio:

Constructing a Global Ontology by Concept Mapping Using Wikipedia Thesaurus. 1205-1210 - Minghua Pei, Kotaro Nakayama, Takahiro Hara, Shojiro Nishio:

An Integrated Method for Web Resource Categorization. 1211-1216 - Lifei Chen, Yanfang Ye, Qingshan Jiang:

A New Centroid-Based Classifier for Text Categorization. 1217-1222 - Zhiwei Zhang, Xuan Hieu Phan

, Susumu Horiguchi:
An Efficient Feature Selection Using Hidden Topic in Text Categorization. 1223-1228 - Haojun Sun, Zhihui Liu, Lingjun Kong:

A Document Clustering Method Based on Hierarchical Algorithm with Model Clustering. 1229-1233 - Toshihiko Yamakami:

A Weak-Tie Based Regularity Analysis of Mobile Clickstreams. 1234-1239 - Guangwei Wang, Kenji Araki:

A Graphic Reputation Analysis System for Mining Japanese Weblog Based on both Unstructured and Structured Information. 1240-1245 - Min-Feng Wang, Yen-Ching Wu, Meng-Feng Tsai:

Exploiting Frequent Episodes in Weighted Suffix Tree to Improve Intrusion Detection System. 1246-1252 - Saoucene Mahfoudh, Pascale Minet:

An Energy Efficient Routing Based on OLSR in Wireless Ad Hoc and Sensor Networks. 1253-1259 - Nagham H. Saeed

, Maysam F. Abbod
, Hamed S. Al-Raweshidy
:
Intelligent MANET Routing System. 1260-1265 - Ehsan Ahvar, Mahmood Fathy:

Special Evaluation: A Practical Simulation-Based Method for Accurate Performance Evaluation of Routing Protocols in Wireless Sensor Networks. 1266-1271 - Chu-Hsing Lin, Wei-Shen Lai, Yen-Lin Huang, Mei-Chun Chou:

Secure Routing Protocol with Malicious Nodes Detection for Ad Hoc Networks. 1272-1277 - Siwaruk Siwamogsatham:

On Backoff Timer Scheduling for Smart-DCF and Performance Evaluation. 1278-1284 - S. A. Mahmud, Shahbaz Khan, Qiang Ni

, Hamed S. Al-Raweshidy
:
Capacity Issues in Meshed High Data Rate WPANs. 1285-1290 - Ji Zhang, Jouni Korhonen, SooHong Park, David A. J. Pearce:

TCP Quick-Adjust by Utilizing Explicit Link Characteristic Information. 1291-1298 - Okan Yilmaz, Ing-Ray Chen, Gregory Kulczycki, William B. Frakes:

Spillover-Partitioning Call Admission Control for Revenue Optimization with QoS Guarantees for Multiple Service Classes in Mobile Wireless Networks. 1299-1304 - Zhanqiang Huo, Naishuo Tian, Wuyi Yue, Shunfu Jin:

Simulation Study of a Connection-Oriented Internet Service Based on a Queueing Model. 1305-1310 - Song Guo, Mianxiong Dong

, Minyi Guo:
Performance Analysis of Heuristic Algorithms for Lifetime-Aware Directional Multicasting in Wireless Ad Hoc Networks. 1311-1316 - Hao-Hsiang Hung, Ling-Jyh Chen

:
An Analytical Study of Wireless Error Models for Bluetooth Networks. 1317-1322 - Mikko Multanen, Kimmo Raivio, Pasi Lehtimäki:

Outlier Detection in Cellular Network Data Exploration. 1323-1328 - Qingcheng Li, Jin Zhang, Xiaoli Gong, Zhenhua Zhang:

A Novel License Distribution Mechanism in DRM System. 1329-1334 - Mahmoud Nasreldin, Heba Kamal Aslan, Magdy El-Hennawy, Adel El-Hennawy:

WiMax Security. 1335-1340 - Tudor Joan Cerlinca, Cristina Elena Turcu, Marius Cristian Cerlinca:

Integrating Mobile Applications into RFID Based B2B Systems. 1341-1345 - Yawer Yousuf, Vidyasagar M. Potdar

:
A Survey of RFID Authentication Protocols. 1346-1350 - Vasile Gaitan

, Cornel Turcu, Alexandru Goloca:
High Complexity Control Gates with Advanced RFID Features for Production Process Monitoring. 1351-1356 - Atif Sharif, Vidyasagar M. Potdar

:
A Critical Analysis of RFID Security Protocols. 1357-1362 - Stéphanie Chollet, Philippe Lalanda, André Bottaro:

Transparently Adding Security Properties to Service Orchestration. 1363-1368 - José L. Ruiz, Juan C. Dueñas, Félix Cuadrado

:
A Service Component Deployment Architecture for e-Banking. 1369-1374 - Frank Bormann, Stephan Flake, Jürgen Tacken, Carsten Zoth:

Third-Party-Initiated Context-Aware Real-Time Charging and Billing on an Open SOA Platform. 1375-1380 - Elmar Zeeb, Steffen Prüter, Frank Golatowski

, Frank Berger:
A Context Aware Service-Oriented Maintenance System for the B2B Sector. 1381-1386 - Hendrik Bohn

, Andreas Bobek, Frank Golatowski
:
WS-BPEL Process Compiler for Resource-Constrained Embedded Systems. 1387-1392 - Andre Pohl, Heiko Krumm, Felix Holland, Franz-Josef Stewing, Ingo Lück:

Service-Orientation and Flexible Service Binding in Distributed Automation and Control Systems. 1393-1398 - Félix Cuadrado

, Boni García
, Juan C. Dueñas, Hugo A. Parada G.
:
A Case Study on Software Evolution towards Service-Oriented Architecture. 1399-1404 - Xiaorong Li, Stephen John Turner

, Kok Heng Tong, Hoong-Maeng Chan, Terence Hung:
Design of an SLA-Driven QoS Management Platform for Provisioning Multimedia Personalized Services. 1405-1409 - Corina Popescu, Jose L. Martinez Lastra

:
A Method for the Formal Representation of the Boolean Conditions of Orchestrated Services. 1410-1415 - Witold Abramowicz

, Konstanty Haniewicz, Monika Kaczmarek
, Raúl Palma, Dominik Zyskowski:
NFP Ontology for Discovery and Sharing Web Services in Distributed Registries. 1416-1421 - Félix Cuadrado

, Juan C. Dueñas, José L. Ruiz, Jesús Bermejo Muñoz, Miguel García:
An Open Source Platform for the Integration of Distributed Services. 1422-1427 - Yaning Liu, Hongbo Wang, Yu Lin, Shiduan Cheng:

Modeling and Quantifying the Impact of P2P File Sharing Traffic on Traditional Internet Traffic. 1428-1433 - Sudath Indrasinghe, Rubem Pereira, John Haggerty:

Protocol Specification for Conflict Free MANET Address Allocation Mechanisms. 1434-1439 - Hung-Yi Chang, Pi-Chung Wang

, Chia-Tai Chan, Chun-Liang Lee:
A New Service Level Agreement Model for Best-Effort Traffics in IP over WDM. 1440-1443 - Kenvi Wang, Tong-Tai Chiang, Lin-Yi Peng, Madjid Merabti:

A New Approach of Fuzzy-Clustered Channel Assignment Method Promoting Hierarchical Cellular Network Performance. 1444-1449 - Jen-Chun Chiang, Hsiang-Fu Lo, Wei-Tsong Lee:

Scalable Video Coding of H.264/AVC Video Streaming with QoS-Based Active Dropping in 802.16e Networks. 1450-1455 - Rubem Pereira, Ella Grishikashvili Pereira

:
Packet Size Variability in Real Time Transmission of Smoothed MPEG-4 Streams. 1456-1461 - Yi-Ting Fang, Tzung-Chian Huang, Pi-Chung Wang

:
Ternary CAM Compaction for IP Address Lookup. 1462-1467 - Stefan Wallin, Leif Landen:

Telecom Alarm Prioritization Using Neural Networks. 1468-1473 - Dong-Liang Lee, Lawrence Y. Deng:

Digital Certificate Mobile Agent Technologies in Distance Learning. 1474-1479 - Nobuyoshi Sato, Yoshitoshi Murata:

Quality Control Schemes for Industrial Production by Workers' Motion Capture. 1480-1485 - Sheng-Yuan Yang:

Developing of an Ontological Focused-Crawler for Ubiquitous Services. 1486-1491 - Shu-Cheng Lin, Hui-Min Tseng, Yi-Cheng Chang, Hui-Lan Lee, Te-Lung Liu, Chu-Sing Yang, C. Eugene Yeh:

TWAREN Optical Network Laboratory and Lightpath Control System. 1492-1498 - Chiou-Yng Lee

:
Concurrent Error Detection in Digit-Serial Normal Basis Multiplication over GF(2m). 1499-1504 - Chun-Liang Hsu, Teng-Yaw Hsu, Kuan-Yen Ho, Wei-Bin Wu:

Practical Design of Intelligent Living-Space Based on Blue-Tooth System. 1505-1510 - Hideaki Yanagisawa, Minoru Uehara, Hideki Mori:

Interface Implementation Using Ajax for Web-Based Instruction Set Simulator. 1511-1516 - Lawrence Y. Deng, Yi-Jen Liu:

Semantic Analysis and Video Event Mining in Sports Video. 1517-1522 - Wun-She Yap

, Swee-Huay Heng, Bok-Min Goi
:
On the Security of an Identity-Based Aggregate Signature Scheme. 1523-1528 - Hangbae Chang, Jong Hyuk Park, Hongsuk Kang:

The Security System Design in Online Game for u Entertainment. 1529-1533 - Ryuzou Nishi, Yoshiaki Hori, Kouichi Sakurai:

Key Distribution Scheme Using Matched Filter Resistant against DoS Attack. 1534-1539 - Binod Vaidya, Byung-Lok Cho, Jong-An Park, Seung Jo Han:

Investigating Secure Framework for Hybrid Multipath Ad Hoc Network. 1540-1545 - Hye-Young Kim, Young-Sik Jeong, Laurence Tianruo Yang:

Intra Domain Route Optimization for Ubiquitous. 1546-1550 - Koichi Miyashita, Tsutomu Terada

, Shojiro Nishio:
A Map Matching Algorithm for Car Navigation Systems that Predict User Destination. 1551-1556 - Jong-Hyouk Lee, Yeong-Deok Kim, Tai-Myoung Chung:

An Investigation of Distance-Based Proxy Mobile Client Selection Schemes for NetLMM. 1557-1560 - Nguyen Hoang Viet, Ngo Anh Vien, SeungGwan Lee, TaeChoong Chung:

Efficient Distributed Sensor Dispatch in Mobile Sensor Network. 1561-1566 - Ching-Hsien Hsu, Jong Hyuk Park, Chia-Hao Yu:

Adaptive Scheduling Mechanisms toward Intelligent Services in Mobile and Wireless RFID Environments. 1567-1572 - Hong Chen

, Nozomi Ikeuchi, Qun Jin:
Implementation of Ubiquitous Personal Study Using Web 2.0 Mash-up and OSS Technologies. 1573-1578 - Yanxiang He, Haowen Liu, Naixue Xiong, Laurence Tianruo Yang:

Selecting News and Elders in Unstructured Peer-to-Peer Network under Churn. 1579-1584 - Hiroyuki Nakamura, Qiangfu Zhao:

Information Hiding Based on Image Morphing. 1585-1590 - Jung-Sik Cho, Sang-Soo Yeo

, Su-Chul Hwang, Sang-Yong Rhee, Sung Kwon Kim:
Enhanced Yoking Proof Protocols for RFID Tags and Tag Groups. 1591-1596 - Kari Anne Haaland Thorsen, Chunming Rong:

Data Integration in Oil and Gas at Norwegian Continental Shelf. 1597-1602 - Said Elnaffar, Zakaria Maamar, Hamdi Yahyaoui

, Jamal Bentahar
, Philippe Thiran:
Reputation of Communities of Web Services - Preliminary Investigation. 1603-1608 - Dang Minh Quan, Jörn Altmann

:
Bilateral Bargaining Game and Fuzzy Logic in the System Handling SLA-Based Workflow. 1609-1614 - Wei Shi, Jian Wu, Shaolin Zhou, Ling Zhang, Yuyu Yin

, Zhaohui Wu:
Facilitating the Flexible Modeling of Human-Driven Workflow in BPEL. 1615-1624 - Toshihiko Yamakami:

A Long Interval Method to Identify Regular Monthly Mobile Internet Users. 1625-1630 - Luiz A. Paula Lima Jr., Alcides Calsavara:

A Paradigm Shift in the Design of Mobile Applications. 1631-1635 - Shou-Chih Lo, Jeng-Long Chiang, Shun-Ren Yang, Wen-Tsuen Chen:

Design of a Context-Aware Mobile Guiding Application. 1636-1641 - Nebrasse Ellouze, Mohamed Ben Ahmed, Elisabeth Métais:

Overview of Topic Map Construction Approaches. 1642-1647 - Vuong Xuan Tran, Hidekazu Tsuji:

Explaining Answers from Agent Communication of Semantic Web Information. 1648-1653 - Noriko Kitani, Shûichi Yukita:

Mathematical Ontology and a Software Tool for Semantic Retrieval of Exercise Problems. 1654-1659 - Saman Iftikhar

, Hafiz Farooq Ahmad
, Hiroki Suguri:
Agent Based Semantic Interoperability between Agents and Semantic Web Languages. 1660-1665 - Hyung-Lae Kim, Tae-Nyun Kim, Chang-Sung Jeong:

Grid Resource Management System and Semantic Information System. 1666-1671 - Chung-Ming Huang, Kun-Chan Lan, Chang-Zhou Tsai:

A Survey of Opportunistic Networks. 1672-1677 - Julien Haillot, Frédéric Guidec:

Towards a Usenet-Like Discussion System for Users of Disconnected MANETs. 1678-1683 - Jussi Kangasharju, Andreas Heinemann:

Incentives for Opportunistic Networks. 1684-1689 - Erik Kuiper, Simin Nadjm-Tehrani:

Geographical Routing in Intermittently Connected Ad Hoc Networks. 1690-1695 - Jonah P. Tower, Thomas D. C. Little

:
A Proposed Scheme for Epidemic Routing with Active Curing for Opportunistic Networks. 1696-1701 - Chien-Shiu Lin, Wei-Shyh Chang, Ling-Jyh Chen

, Cheng-Fu Chou:
Performance Study of Routing Schemes in Delay Tolerant Networks. 1702-1707 - Janico Greifenberg, Dirk Kutscher

:
Efficient Publish/Subscribe-Based Multicast for Opportunistic Networking with Self-Organized Resource Utilization. 1708-1714 - Andreas Heinemann, Jussi Kangasharju

, Max Mühlhäuser
:
Opportunistic Data Dissemination Using Real-World User Mobility Traces. 1715-1720

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














